On Thu, Jul 22, 2010 at 20:23:22 -0500, Jonathan Nieder wrote:

> Greg Brockman wrote at <http://bugs.debian.org/590026>:
> 
> > A fix for an exploitable buffer overrun (CVE-2010-2542, per [1]) was
> > committed to git in [2].  In particular, if an attacker were to create
> > a crafted working copy where the user runs any git command, the
> > attacker could force execution of arbitrary code.
> > 
> > This attack should be mitigated to a denial of service if git is
> > compiled with appropriate stack-protecting flags.
> > 
> > This buffer overrun was introduced in [3], which first appeared in
> > v1.5.6, and is fixed in v1.7.2.
> > 
> > Greg
> > 
> > [1] http://seclists.org/oss-sec/2010/q3/93
> > [2] 
> > http://git.kernel.org/?p=git/git.git;a=commit;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc
> > [3] 
> > http://git.kernel.org/?p=git/git.git;a=commit;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20
> 
> More precisely, the problem is a buffer overrun when encountering a
> file .git with the content
> 
>   gitdir: (something really long)
> 
> When git checks the target of the .git file’s reference, it stores
> the filename on the stack in a buffer of size PATH_MAX.
> 
> (By contrast, the environment variable GIT_DIR=(something really long)
> is protected against already.)
> 
> This can be used for privilege escalation when a privileged user
> runs a git command that checks for a repository (like ‘git ls-remote’)
> in /tmp and outside of any git repository, for example.
> 
Hi Jonathan,

are you preparing an upload to sid for this as well?  Do you need
sponsorship?

Cheers,
Julien

Attachment: signature.asc
Description: Digital signature

Reply via email to